CN108140335B - Secret random number synthesis device, secret random number synthesis method, and recording medium - Google Patents

Secret random number synthesis device, secret random number synthesis method, and recording medium Download PDF

Info

Publication number
CN108140335B
CN108140335B CN201680059243.XA CN201680059243A CN108140335B CN 108140335 B CN108140335 B CN 108140335B CN 201680059243 A CN201680059243 A CN 201680059243A CN 108140335 B CN108140335 B CN 108140335B
Authority
CN
China
Prior art keywords
hidden
secret
text
random number
hidden text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201680059243.XA
Other languages
Chinese (zh)
Other versions
CN108140335A (en
Inventor
滨田浩气
菊池亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Publication of CN108140335A publication Critical patent/CN108140335A/en
Application granted granted Critical
Publication of CN108140335B publication Critical patent/CN108140335B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • G06F7/586Pseudo-random number generators using an integer algorithm, e.g. using linear congruential method
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention efficiently creates a hidden corpus of values a, b, c having a relationship of c ═ ab. A hidden character generation unit (12) generates a hidden character satisfying x for i 0i=f(ki) X ofiHidden text of (1)i]And satisfy yi=g(ki) Y of (A) to (B)iHidden text of (y)i]. A fragment generation unit (13) generates a restored [ x ] for i ═ 1i]‑[ai]Is/are as followsiAnd recover [ yi]‑[bi]Rho ofiCalculate [ ci]+i[bi]+ρi[ai]+iρiGenerating a hidden text [ z ]1],...,[zm]. The random number synthesis unit (14) uses different values k0,...,kmAnd secret text [ z1],...,[zm]Generating a hidden text [ z ]0]。

Description

Secret random number synthesis device, secret random number synthesis method, and recording medium
Technical Field
The present invention relates to an encryption application technology, and more particularly to a technology for performing random number synthesis without exposing input data.
Background
As a method of obtaining a specified operation result without restoring an encrypted numerical value, there is a method called secret calculation (see, for example, non-patent document 1). In the method of non-patent document 1, encryption is performed in which so-called pieces of numerical values are distributed among three secret computing devices, and the three secret computing devices perform coordinated computation, so that the results of addition and subtraction, constant addition, multiplication, constant multiplication, logical operation ("no", "and", "or", "exclusive or"), and data format conversion (integer, binary) can be kept distributed among the three secret computing devices, that is, they can be kept encrypted, without restoring the original numerical values.
When multiplication is performed in secret calculation, there is a method of non-patent document 2 as a method that can efficiently perform multiplication using hidden texts having a relation of c ═ ab among plaintext a, b, and c.
Documents of the prior art
Non-patent document
Non-patent document 1: qiantaoshi, Tianhaoyao, fifty Dada, g Yi, "" light quantitative determination maybe 3 パーティ secret Seki count Zhi Ding "(CSS), 2010 year
Non-patent document 2: ivan Damgard, Marcel Keller, Enrique Larraia, Valero Pastro, Peter Scholl, and Nigel P.Smart, "Practical overview Security MPC for variance major-or Breaking the SPDZ limits", Computer Security-ESORICS 2013, vol.8134of feature Notes in Computer Science, pp.1-18, 2013.
Disclosure of Invention
Problems to be solved by the invention
However, in the conventional technique described in non-patent document 2, in order to create a concealed corpus in which plaintext a, b, and c have a relationship of c ═ ab, somewhat homomorphic encryption with a very high calculation cost is used, and efficiency is deteriorated.
In view of the above, an object of the present invention is to provide a technique for efficiently creating a hidden corpus having values a, b, and c in a relationship where c ═ ab.
Means for solving the problems
In order to solve the above problem, a secret random number combining device of the present invention includes: the hidden word generation unit generates a hidden word satisfying x when i is 0, …, mi=f(ki) X ofiHidden text of (1)i]And satisfy yi=g(ki) Y of (A) to (B)iHidden text of (y)i](ii) a The fragment generation unit generates a restored [ x ] for i 1, …, mi]-[ai]Is/are as followsiAnd recover [ yi]-[bi]Rho ofiCalculate [ ci]+i[bi]+ρi[ai]+iρiGenerating a hidden text [ z ]1],…,[zm](ii) a And a random number synthesis unit for calculating the following formula and generating a hidden text [ z0],
Figure GDA0002698864040000021
Wherein the content of the first and second substances,
Figure GDA0002698864040000022
wherein t is an integer of 0 or more, m is 2t +1, i is an integer of 1 to m, and [ a ] isi]、[bi]、[ci]Are respectively set to m values ai、bi、ciThe secret text of (1) is0,…,kmM +1 different values are set, and f (x) and g (x) are set to random t-degree polynomials.
ADVANTAGEOUS EFFECTS OF INVENTION
According to the secret random number synthesis technique of the present invention, it is possible to efficiently create a concealed corpus of values a, b, and c having a relationship of c ═ ab.
Drawings
Fig. 1 is a diagram illustrating a functional configuration of a secret random number synthesis system.
Fig. 2 is a diagram illustrating a functional configuration of a secret random number combining apparatus.
Fig. 3 is a diagram illustrating a process flow of a secret random number synthesis method.
Detailed Description
Before the embodiments are explained, the definitions of the labeling methods and terms in the present specification will be explained.
< labeling method >
A value in which a certain value a is concealed by encryption, secret distribution, or the like is referred to as a concealed text of a, and is denoted as [ a ]]. Also, a is referred to as [ a ]]The plaintext of (1). When the concealment is changed to secret distribution, the secret is passed through [ a ]]Refer to the collection of secret dispersed fragments that aspects (party) have. With [ a ]]iReference to hidden text [ a ]]Aspect I of (1) PiHaving the same. The shares are segments that are secretly distributed, and the aspects are coordinatedEach participant of the secret calculation.
< recovery >
The process of calculating the plaintext a from the hidden text [ a ] is referred to as restoration and is described by the following expression.
a←Reveal([a])
< addition, subtraction, constant times >
The hidden text [ a ] having two values a and b for each operation of addition and subtraction of the hidden text]、[b]As input, calculating the calculation results d of a + b and a-b1、d2Hidden text of (d)1]、[d2]. Secret text [ a ] with value a for operation of constant multiple of secret text]And a plaintext c as inputs, calculating a calculation result d of ca3Hidden text of (d)3]. The execution of these operations is described by the following expression.
[d1]←Add([a],[b]),
[d2]←Sub([a],[b]),
[d3]←CMul(c,[a])
In addition, Add ([ a ], [ b ]), Sub ([ a ], [ b ]), CMul (c, [ a ]) will be abbreviated as [ a ] + [ b ], [ a ] - [ b ], c [ a ], respectively, without causing misunderstandings.
< Generation of random secret text >
The process of generating the secret text [ r ] of the random value r unknown to anyone is described as follows.
[r]←Rand()
Hereinafter, embodiments of the present invention will be described in detail. In the drawings, the same reference numerals are given to constituent elements having the same functions, and redundant description is omitted.
[ first embodiment ]
As illustrated in fig. 1, the secret random number combining system according to the first embodiment includes n (≧ 2) secret random number combining devices 11,…,1n. In the present embodiment, the secret random number synthesizing apparatus 11,…,1nAre each connected to a communication network 2. The communication network 2 is a device 1 capable of combining secret random numbers1,…,1nForm of communicationThe communication Network of the circuit switching system or the packet switching system of (1) may use, for example, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), or the like. Moreover, the respective devices do not necessarily need to be able to communicate online via the communication network 2. For example, the input may be configured to be input to the secret random number synthesizing apparatus 1iInformation (i ∈ {1, …, n-1}) is stored in a removable recording medium such as a magnetic tape or a USB memory, and is input online from the removable recording medium.
As illustrated in fig. 2, the secret random number synthesizing apparatus 1 includes: an input unit 11; a hidden text generation unit 12; a segment generating unit 13; a random number synthesizing unit 14; and an output unit 15. The secret random number combining apparatus 1 implements the secret random number combining method according to the first embodiment by performing the processing of each step illustrated in fig. 3.
The secret Random number combining device 1 is a special device configured by reading a special program into a known or special computer having, for example, a Central Processing Unit (CPU) and a main storage device (RAM). The secret random number combining device 1 executes each process under the control of, for example, a central processing unit. The data input to the secret random number combining device 1 or the data obtained in each process is stored in, for example, a main storage device, and the data stored in the main storage device is read out to a central processing unit as necessary and used for other processes. At least a part of each processing unit of the secret random number combining apparatus 1 may be constituted by hardware such as an integrated circuit.
Referring to fig. 3, a process of the secret random number synthesis method of the first embodiment will be described.
In step S11, m sets of values a are input to the input unit 11i、bi、ciSecret text ([ a ]i],[bi],[ci]) And m +1 values k0,…,km. Here, m is 2t +1, t is an integer of 0 or more, and i is each an integer of 1 or more and m or less. Value k0,…,kmAre different arbitrary values and are totally secretCryptographic random number synthesizer 11,…,1nSharing is performed in advance. Value k0,…,kmThe information is sent to the hidden text generation unit 12. Secret text ([ a ]i],[bi],[ci]) Is sent to the clip generating unit 13.
In step S121, the hidden text generation unit 12 generates a random t-degree polynomial in which f (x) is unknown, and i is 0, …, and m, so as to satisfy xi=f(ki) X ofiHidden text of (1)i]. A random t-th order polynomial means that the coefficients of the terms are randomly determined t-th order polynomials. Secret text x1],…,[xm]Is sent to the clip generating unit 13. Secret text x0]Is transmitted to the output unit 15.
Specifically, the hidden text generation unit 12 generates the hidden text [ x ] as follows0],…,[xm]. First, equation (1) is calculated for i equal to 0, …, t, and a hidden text [ x ] is generated0],…,[xt]。
[xi]←Rand()…(1)
Next, equation (2) is calculated for i +1, …, m, and a hidden text [ x ] is generatedt+1],…,[xm]。
Figure GDA0002698864040000041
Wherein, … (2)
Figure GDA0002698864040000042
In step S122, the hidden text generation unit 12 generates a random t-degree polynomial in which g (x) is unknown, and i is 0, …, and m so as to satisfy yi=g(ki) Y of (A) to (B)iHidden text of (y)i]. Secret text y0],…,[ym]The method of generating the same is only to generate the hidden text [ x ]0],…,[xm]The same procedure may be carried out. Secret text y1],…,[ym]Is sent to a segment generatorInto a unit 13. Secret text y0]Is transmitted to the output unit 15.
In step S131, the segment generating section 13 calculates expression (3) for i equal to 1, …, m, and generates a valuei
i←Reveal([xi]-[ai])…(3)
In step S132, the segment generating section 13 calculates expression (4) for i equal to 1, …, m, and generates a value ρi
ρi←Reveal([yi]-[bi])…(4)
In step S133, the segment generating section 13 generates a hidden text [ z ] by calculating equation (5) for i equal to 1, …, mi]. Secret text [ z ]1],…,[zm]Is transmitted to the random number synthesizing unit 14.
[zi]←[ci]+i[bi]+ρi[ai]+iρi…(5)
In step S14, the random number synthesis unit 14 calculates expression (6) and generates a hidden text [ z0]. Secret text [ z ]0]Is transmitted to the output unit 15.
Figure GDA0002698864040000051
Wherein, … (6)
Figure GDA0002698864040000052
In step S15, the output section 15 outputs the hidden text set ([ x ]0],[y0],[z0])。
[ second embodiment ]
The secret random number synthesis method according to the second embodiment is a method of generating a hidden text set having values a, b, and c having a relationship of c ═ ab when secret distribution by addition is concealed. In the present embodiment, the hidden text [ a ] is inputi],[bi],[ci]And the generated hidden text [ x [ ]i],[yi],[zi]Is a secret dispersed secret text based on addition. The secrecy dispersion of addition is described in, for example, non-patent document 2.
In step S121, the hidden text generation unit 12 of the second embodiment outputs the hidden text [ x ] to the input device where i is 0, …, ti]Then, a random value is generated in every direction, and the generated value is set as a hidden text [ x ]i]The fraction of (c). Then, in step S122, a hidden text [ y ] is generated for i ═ 0, …, ti]Then, random values are generated in all directions, and the generated values are set as the secret text [ y ]i]The fraction of (c).
With the above configuration, according to the secret random number synthesis technique of the present invention, even a desired person does not know and c is satisfiedi=aibiRandom m (═ 2t +1) group of values (a)i,bi,ci) Secret text ([ a ]i],[bi],[ci]) In the case where any value of t group is leaked, a hidden text ([ x, y, z)) of a group (x, y, z) satisfying a random value where z ═ xy) unknown to anyone may be created],[y],[z])。
The invention is characterized in that the random value x is used0、y0The multiplication of the hidden text (2) is performed by decomposing the hidden text (2) into 2t +1 multiplications. At this time, [ x ] is dispersed because of the secret using the (t +1, 2t +1) threshold value]And [ y]Since the information is distributed over 2t +1 hidden texts, x and y cannot be restored even if t-group information in the 2t + 1-group hidden text leaks. As a result, a confidential text of a random value group can be created, which is unknown to anyone.
The present invention is not limited to the above-described embodiments, and it goes without saying that modifications can be made as appropriate within the scope not departing from the gist of the present invention. The various processes described in the above embodiments may be executed not only in time series in the order described, but also in parallel or individually depending on the processing capability of the apparatus that executes the processes or the need.
[ program, recording Medium ]
When various processing functions in each device described in the above embodiments are realized by a computer, the contents of processing of the functions to be provided in each device are described by a program. Then, the computer executes the program, and the various processing functions in the above-described devices are realized on the computer.
The program in which the processing contents are described may be recorded in a computer-readable recording medium. The computer-readable recording medium may be any medium such as a magnetic recording device, an optical disk, an magneto-optical recording medium, and a semiconductor memory.
The distribution of the program is performed by, for example, selling, transferring, renting, or the like a portable recording medium such as a DVD or a CD-ROM on which the program is recorded. Further, the program may be stored in a storage device of a server computer, and the program may be distributed by transferring the program from the server computer to another computer via a network.
A computer that executes such a program first temporarily stores a program recorded on a portable recording medium or a program transferred from a server computer in its own storage device, for example. Then, when executing the processing, the computer reads the program stored in its own recording medium and executes the processing according to the read program. In addition, as another execution mode of the program, the computer may directly read the program from the portable recording medium and execute the processing according to the program, or the computer may sequentially execute the processing according to the received program every time the program is transferred from the server computer to the computer. The above-described processing may be executed by a so-called ASP (Application Service Provider) Service that realizes a processing function only by an execution instruction and a result acquisition without transferring a program from a server computer to the computer. The program in this embodiment includes data (data which is not a direct instruction to the computer but has a property of specifying processing by the computer, etc.) which is information for processing by the electronic computer and is viewed in accordance with the program.
In this embodiment, the present apparatus is configured by executing a predetermined program on a computer, but at least a part of the contents of the processes may be realized by hardware.

Claims (5)

1. A secret random number synthesizing apparatus comprising:
a hidden word generation unit for generating a hidden word satisfying x when i is 0, …, mi=f(ki) X ofiHidden text of (1)i]And satisfy yi=g(ki) Y of (A) to (B)iHidden text of (y)i];
The fragment generation unit generates a restored [ x ] for i 1, …, mi]-[ai]Is/are as followsiAnd recover [ yi]-[bi]Rho ofiCalculate [ ci]+i[bi]+ρi[ai]+iρiGenerating a hidden text [ z ]1],…,[zm];
A random number synthesis unit for calculating the following expression and generating a hidden text [ z0],
Figure FDA0002698864030000011
Wherein the content of the first and second substances,
Figure FDA0002698864030000012
and
an output unit for outputting the hidden text set ([ x ]0],[y0],[z0]),
Wherein t is an integer of 0 or more, m is 2t +1, i is an integer of 1 to m, and [ a ] isi]、[bi]、[ci]Are respectively set to m values ai、bi、ciThe secret text of (1) is0,…,kmM +1 different values are set, and f (x) and g (x) are set to random t-degree polynomials.
2. The secret random number synthesizing apparatus according to claim 1,
the hidden word generation unit generates a random value of a hidden word [ x ] for i 0, …, ti]、[yi]When i is t +1, …, m, the following expression is calculated to generate a hidden text [ x [ ]i]、[yi],
Figure FDA0002698864030000013
Figure FDA0002698864030000014
Wherein the content of the first and second substances,
Figure FDA0002698864030000015
3. the secret random number synthesizing apparatus according to claim 2,
[ai]、[bi]、[ci]、[xi]、[yi]、[zi]is a secret dispersed secret ciphertext based on addition,
the hidden word generation unit generates a random value for i 0, …, t as a hidden word [ xi]Generates a random value as a secret word [ y ]i]The fraction of (c).
4. A secret random number synthesis method, comprising:
a hidden word generation step of generating a hidden word satisfying x when i is 0, …, mi=f(ki) X ofiHidden text of (1)i]And satisfy yi=g(ki) Y of (A) to (B)iHidden text of (y)i];
A fragment generation step in which the fragment generation means generates a restored [ x ] for i 1, …, mi]-[ai]Is/are as followsiAnd recover [ yi]-[bi]Rho ofiCalculating[ci]+i[bi]+ρi[ai]+iρiGenerating a hidden text [ z ]1],…,[zm];
A random number synthesis step in which a random number synthesis unit calculates the following formula to generate a secret text [ z ]0],
Figure FDA0002698864030000021
Wherein the content of the first and second substances,
Figure FDA0002698864030000022
and
an output step of outputting the hidden text set ([ x ]0],[y0],[z0]),
Wherein t is an integer of 0 or more, m is 2t +1, i is an integer of 1 to m, and [ a ] isi]、[bi]、[ci]Are respectively set to m values ai、bi、ciThe secret text of (1) is0,…,kmM +1 different values are set, and f (x) and g (x) are set to random t-degree polynomials.
5. A computer-readable recording medium storing a program for causing a computer to function as each means of the secret random number combining apparatus according to any one of claims 1 to 3.
CN201680059243.XA 2015-10-13 2016-10-11 Secret random number synthesis device, secret random number synthesis method, and recording medium Active CN108140335B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2015202058 2015-10-13
JP2015-202058 2015-10-13
PCT/JP2016/080052 WO2017065123A1 (en) 2015-10-13 2016-10-11 Secret random number combination device, secret random number combination method, and program

Publications (2)

Publication Number Publication Date
CN108140335A CN108140335A (en) 2018-06-08
CN108140335B true CN108140335B (en) 2020-12-29

Family

ID=58517180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680059243.XA Active CN108140335B (en) 2015-10-13 2016-10-11 Secret random number synthesis device, secret random number synthesis method, and recording medium

Country Status (5)

Country Link
US (1) US10657847B2 (en)
EP (1) EP3364398B1 (en)
JP (1) JP6583970B2 (en)
CN (1) CN108140335B (en)
WO (1) WO2017065123A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018034079A1 (en) * 2016-08-18 2018-02-22 日本電気株式会社 Secret calculation system, secret calculation method, secret calculation device, distributed information generation device, methods therefor, and program
WO2019009180A1 (en) * 2017-07-05 2019-01-10 日本電信電話株式会社 Secure computing system, secure computing device, secure computing method, program, and recording medium
US10957445B2 (en) 2017-10-05 2021-03-23 Hill-Rom Services, Inc. Caregiver and staff information system
US20220413807A1 (en) * 2019-12-19 2022-12-29 Nippon Telegraph And Telephone Corporation Secure random number generation system, secure computation apparatus, secure random number generation method, and program
JPWO2022168257A1 (en) * 2021-02-05 2022-08-11

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329185A (en) * 2011-01-24 2013-09-25 日本电信电话株式会社 Confidential product-sum computation method, confidential product-sum computation system, computation apparatus, and program for same
CN103403781A (en) * 2011-03-10 2013-11-20 日本电信电话株式会社 Secure multiply-accumulate union system, computation device, secure multiply-accumulate union method, and program thereof
CN104412539A (en) * 2012-07-05 2015-03-11 日本电信电话株式会社 Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program
CN104429019A (en) * 2012-07-05 2015-03-18 日本电信电话株式会社 Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016012111A (en) * 2014-06-30 2016-01-21 富士通株式会社 Encryption processing method, encryption processing device, and encryption processing program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329185A (en) * 2011-01-24 2013-09-25 日本电信电话株式会社 Confidential product-sum computation method, confidential product-sum computation system, computation apparatus, and program for same
CN103403781A (en) * 2011-03-10 2013-11-20 日本电信电话株式会社 Secure multiply-accumulate union system, computation device, secure multiply-accumulate union method, and program thereof
CN104412539A (en) * 2012-07-05 2015-03-11 日本电信电话株式会社 Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program
CN104429019A (en) * 2012-07-05 2015-03-18 日本电信电话株式会社 Secret sharing system, data distribution device, distributed data conversion device, secret sharing method, and program

Also Published As

Publication number Publication date
EP3364398A1 (en) 2018-08-22
EP3364398B1 (en) 2020-05-06
WO2017065123A1 (en) 2017-04-20
CN108140335A (en) 2018-06-08
US20180261133A1 (en) 2018-09-13
US10657847B2 (en) 2020-05-19
JPWO2017065123A1 (en) 2018-06-21
EP3364398A4 (en) 2019-05-22
JP6583970B2 (en) 2019-10-02

Similar Documents

Publication Publication Date Title
CN108140335B (en) Secret random number synthesis device, secret random number synthesis method, and recording medium
EP3096309B1 (en) Secret calculation method, secret calculation system, sorting device, and program
CN111373401B (en) Homomorphic inference device, homomorphic inference method, computer-readable storage medium, and hidden information processing system
CN110199338B (en) Secret calculation system, secret calculation device, secret calculation method, and recording medium
KR102550812B1 (en) Method for comparing ciphertext using homomorphic encryption and apparatus for executing thereof
CN111512592A (en) Conversion key generation device, ciphertext conversion device, secret information processing system, conversion key generation method, conversion key generation program, ciphertext conversion method, and ciphertext conversion program
JPWO2016088453A1 (en) Encryption device, decryption device, encryption processing system, encryption method, decryption method, encryption program, and decryption program
Bibi et al. A novel encryption scheme for high-contrast image data in the Fresnelet domain
JP6777816B2 (en) Secret tampering detection system, secret tampering detection device, secret tampering detection method, and program
JP6585846B2 (en) Secret calculation system, secret calculation device, secret calculation method, and program
WO2020188906A1 (en) Signature device, verification device, signature method, verification method, signature program, and verification program
US10333697B2 (en) Nondecreasing sequence determining device, method and program
Rizomiliotis et al. On matrix multiplication with homomorphic encryption
CN108140336B (en) Secret authentication code adding device, secret authentication code adding method, and recording medium
US20090279689A1 (en) System and method of authentication
CN111133495B (en) Secret reading device, secret writing device, methods thereof, and recording medium
Hu et al. 1D Sine-Map-Coupling-Logistic-Map for 3D model encryption
Maheswari et al. Cloud Computing based Symmetric Encryption Algorithm (Blueshift)
Babenko et al. Modeling of algebraic analysis of GOST+ cipher in SageMath
Mohamed et al. Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing
JP2014219548A (en) Cipher processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant